Use Azure Automation state configuration report only endpoint if you’re not ready to manage the virtual machines. This functionality enables you to view reporting details in Azure Automation and set push configurations through DSC.
This video explains about how to utilize FIDO key in your environment for passwordless authentication and steps to extend this passwordless functionality to onpremise environment by using Azure AD We have used Yubico FIDO key for this Demo.
For enterprises that use passwords today banned password list, block reused passwords, stop predictable passwords with strong MFA are the security measures and enforcements. However when you have a shared PC environment for few business cases password less authentication mechanism via FIDO keys provides a better security to the IT Infrastructure. Passwordless authentication methods are more convenient because the password is removed and can be replaced with biometrics.
This video focuses on enabling security key based passwordless authentication and seeing the example via Microsoft Authenticator.
It is important to note the every organization should block legacy authentication to improve security posture since MFA is not supported for legacy authentication clients.
Take a look at this vide to see what are the steps we can use to identify the legacy authentication utilization in your Azure AD tenant.
Microsoft Sentinel’s automation rules give you the ability to develop and organize rules that can be used in a variety of scenarios, allowing you to manage automation from a central location. A playbook is a compilation of various corrective actions that may be routinely executed from Microsoft Sentinel.
When triggered by specific alerts or incidents, as determined by an analytics rule or an automation rule, a playbook can help automate and orchestrate your threat response. It can be used manually or set to run automatically in response to specific alerts or incidents.
Take a look at this video on getting started with Automation Rules & Playbooks
Enterprise-wide threat information and intelligent security analytics are provided by Microsoft Sentinel. A single solution for attack detection, threat visibility, proactive hunting, and threat response with Microsoft Sentinel.
Microsoft Sentinel Analytics provides an intelligent solution that you can use to detect potential threats and vulnerabilities in your organizations. Microsoft Sentinel Analytics helps you detect, investigate, and remediate cybersecurity threats.
Additionally, Microsoft Sentinel includes built-in worksheet templates so that as soon as a data source is connected, you may instantly acquire insights from your data.
It’s close to 4 yrs that Azure sentinel has been in the market and lot of organizations are utilizing them fully in their Secops Team and the SIEM cloud native tool have been doing a great job.
Many businesses use Office 365, and they are expanding their use of the sophisticated security and compliance tools offered by Microsoft 365. To fully comprehend an attack, you frequently need to mix security data from users and end point applications with data from your IT environment and third parties. If you could accomplish all of this while staying within a single cloud provider’s compliance guidelines, that would be perfect.
Take a look at this video on getting started with Microsoft Sentinel in your Environment.
Azure AD Access Package is a solution within Azure AD that provides further control to your Azure AD apps especially for External Access. Access package helps us to further customize the Guest Access by setting up the specific permissions and roles to each external tenant. Take a look at this video for getting started with Azure AD Access Packages.
Today we are going to take a look at one of the Azure Identity governance preview feature lifecycle workflows.
Workflow helps a lot that a user is prepared to work when they first join the organization. They have proper access to the data, group memberships, and programs they require. By automating these three fundamental lifecycle activities Joiner ,Mover & leaver Lifecycle Workflows, a new Identity Governance service, enables companies to manage Azure AD cloud identities in a easier way.
Take a look at this video to get more information on the same.
This topic deep dives on the Azure AD B2B Collaboration and provides more information on how to get started. With B2B collaboration we can extend the collaboration beyond your organizational boundaries by putting the required controls in place
I'm a Certified Microsoft Infrastructure/Cloud Architect with hands-on 14 years of International proven experience in Planning, Design, Execution, Integration, Operations, IT Management specialized in Messaging Platforms Microsoft Teams with Telephony, Skype for Business Voice, Microsoft Exchange, Intune Deployment, Microsoft Azure Infrastructure, and Cloud Security Implementations.
Over time have developed complete IT Implementation skills on Microsoft Infrastructure/Cloud projects within Multinational, Government, Construction, Leisure & Entertainment, Production, Automobile & Financial Industries.
I can be contacted through email sathish@ezcloudinfo.com or through mobile +31 62 050 6978